{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T17:55:07Z","timestamp":1757613307903,"version":"3.44.0"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/cybersa.2019.8899491","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T18:18:43Z","timestamp":1574705923000},"page":"1-10","source":"Crossref","is-referenced-by-count":2,"title":["Domain Identification for Commercial Intention-holding Posts on Twitter"],"prefix":"10.1109","author":[{"given":"Yuanyuan","family":"Zhu","sequence":"first","affiliation":[{"name":"Southampton Business School, University of Southampton,Southampton,United Kingdom"}]},{"given":"Mee","family":"Chi So","sequence":"additional","affiliation":[{"name":"Southampton Business School, University of Southampton,Southampton,United Kingdom"}]},{"given":"Paul","family":"Harrigan","sequence":"additional","affiliation":[{"name":"UWA Business School, University of Western Australia,Perth,Australia"}]}],"member":"263","reference":[{"key":"ref39","first-page":"2389","article-title":"Mining User Consumption Intention from Social Media Using Domain Adaptive Convolutional Neural Network","volume":"15","author":"ding","year":"2015","journal-title":"AAAI"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2013.01.001"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2016.1061792"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.09.021"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCS.2016.7586371"},{"key":"ref30","first-page":"430","article-title":"A survey of lexical functional grammar in the Arabic context","volume":"4","author":"salloum","year":"2016","journal-title":"Int J Com Net Tech"},{"key":"ref37","doi-asserted-by":"crossref","DOI":"10.1609\/icwsm.v8i1.14505","article-title":"Identifying Purchase Intent from Social Posts","author":"gupta","year":"2014","journal-title":"ICWSM"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3011077.3011134"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1177\/0165551516677946"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2905055.2905191"},{"key":"ref10","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural network","author":"krizhevsky","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1777432.1777435"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.intmar.2018.07.002"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488009"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63315-2_36"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2012.2188589"},{"key":"ref15","first-page":"1035","article-title":"A broad-coverage normalization system for social media language","volume":"1","author":"liu","year":"0","journal-title":"Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics Long Papers"},{"journal-title":"IDC (2011) The 2011 digital universe study","year":"0","key":"ref16"},{"key":"ref17","first-page":"3104","article-title":"Sequence to sequence learning with neural networks","author":"sutskever","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref18","first-page":"616","article-title":"Tackling the poor assumptions of naive bayes text classifiers","author":"rennie","year":"0","journal-title":"Proceedings of the 20th International Conference on Machine Learning (ICML-03)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2016.02.002"},{"key":"ref28","first-page":"2493","article-title":"Natural language processing (almost) from scratch","volume":"12","author":"collobert","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.2015.0968"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3758\/BF03192999"},{"journal-title":"Leveraging web query logs to learn user intent via bayesian latent variable model","year":"2011","author":"celikyilmaz","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.1110.0700"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.125"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1198\/004017007000000245"},{"journal-title":"Generating Sequences with Recurrent Neural Networks","year":"2013","author":"graves","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W16-0425"},{"key":"ref2","first-page":"3","article-title":"Toward an architecture for never-ending language learning","volume":"5","author":"carlson","year":"2010","journal-title":"AAAI"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1348549.1348556"},{"key":"ref1","first-page":"1679","article-title":"Text mining: Challenges and future directions, In Electronics and Communication Systems (ICECS)","author":"akilan","year":"0","journal-title":"2015 The 2nd International Conference on"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2016.06.002"},{"key":"ref22","article-title":"LSTM neural networks for language modeling","author":"sundermeyer","year":"0","journal-title":"Thirteenth Annual Conference of the International Speech Communication Association"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807306"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.1120.0713"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1110.1370"},{"key":"ref26","first-page":"1188","article-title":"Distributed representations of sentences and documents","author":"le","year":"0","journal-title":"International Conference on Machine Learning"},{"key":"ref43","first-page":"1041","article-title":"Identifying intention posts in discussion forums","author":"chen","year":"0","journal-title":"Proceedings of the 2013 Conference of the North American Chapter of the Association for Computational Linguistics Human Language Technologies"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1753846.1754025"}],"event":{"name":"2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","start":{"date-parts":[[2019,6,3]]},"location":"Oxford, UK","end":{"date-parts":[[2019,6,4]]}},"container-title":["2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8892713\/8899350\/08899491.pdf?arnumber=8899491","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T18:20:13Z","timestamp":1757010013000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8899491\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/cybersa.2019.8899491","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}